{"id":"https://openalex.org/W7135179139","doi":"https://doi.org/10.1109/iccp68926.2025.11427129","title":"CS-ECC: Chaotic S-box based Elliptic Curve Cryptosystem","display_name":"CS-ECC: Chaotic S-box based Elliptic Curve Cryptosystem","publication_year":2025,"publication_date":"2025-10-16","ids":{"openalex":"https://openalex.org/W7135179139","doi":"https://doi.org/10.1109/iccp68926.2025.11427129"},"language":null,"primary_location":{"id":"doi:10.1109/iccp68926.2025.11427129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp68926.2025.11427129","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116424553","display_name":"Ionu\u021b-Eduard Matei","orcid":"https://orcid.org/0009-0005-3713-0313"},"institutions":[{"id":"https://openalex.org/I3121153395","display_name":"West University of Timi\u015foara","ror":"https://ror.org/0583a0t97","country_code":"RO","type":"education","lineage":["https://openalex.org/I3121153395"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Ionut-Eduard Matei","raw_affiliation_strings":["West University of Timisoara,Computer Science Department,Timisoara,Romania"],"affiliations":[{"raw_affiliation_string":"West University of Timisoara,Computer Science Department,Timisoara,Romania","institution_ids":["https://openalex.org/I3121153395"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5116424553"],"corresponding_institution_ids":["https://openalex.org/I3121153395"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88654893,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.954800009727478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.954800009727478,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.010099999606609344,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.00989999994635582,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.34950000047683716},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.34279999136924744},{"id":"https://openalex.org/keywords/ideal","display_name":"Ideal (ethics)","score":0.296999990940094},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.2734000086784363},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.2653999924659729}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4713999927043915},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40869998931884766},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.35030001401901245},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.33970001339912415},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.2913999855518341},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.27390000224113464},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.26739999651908875},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccp68926.2025.11427129","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccp68926.2025.11427129","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 21st International Conference on Intelligent Computer Communication and Processing (ICCP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W144501919","https://openalex.org/W1613874182","https://openalex.org/W2003736153","https://openalex.org/W2009129512","https://openalex.org/W2019816098","https://openalex.org/W2036378739","https://openalex.org/W2111303611","https://openalex.org/W2154909745","https://openalex.org/W2592206357","https://openalex.org/W2901602009","https://openalex.org/W2905741893","https://openalex.org/W2917426586","https://openalex.org/W2924210827","https://openalex.org/W2944454002","https://openalex.org/W2967243140","https://openalex.org/W2967307615","https://openalex.org/W2995433015","https://openalex.org/W3004257937","https://openalex.org/W3025686870","https://openalex.org/W3085059903","https://openalex.org/W4220810566","https://openalex.org/W4229488204","https://openalex.org/W4230398518","https://openalex.org/W4232836212","https://openalex.org/W4285554264","https://openalex.org/W4323361644","https://openalex.org/W4378976249","https://openalex.org/W4390830964","https://openalex.org/W4411043714","https://openalex.org/W4412108006"],"related_works":[],"abstract_inverted_index":{"Image":[0],"security":[1,41],"plays":[2],"a":[3,92,115,132],"crucial":[4],"role":[5],"in":[6,131,171,179,190],"various":[7],"domains":[8],"where":[9],"sensitive":[10],"information":[11],"is":[12,77],"transmitted,":[13],"such":[14],"as":[15],"telemedicine,":[16],"satellite":[17],"imagery":[18],"transfer,":[19],"and":[20,32,42,76,102,146,161],"military":[21],"communications.":[22],"Effective":[23],"image":[24,94],"encryption":[25,37,64,95],"requires":[26],"strong":[27,157],"security,":[28],"secure":[29],"network":[30,59],"transmission,":[31],"low":[33],"computational":[34,53,182],"cost.":[35],"Traditional":[36],"methods":[38,170],"provide":[39],"robust":[40],"reliable":[43],"transmission":[44],"but":[45,55,69],"are":[46,128],"computationally":[47],"expensive.":[48],"Chaos-based":[49],"cryptosystems":[50],"offer":[51],"lower":[52],"costs":[54],"generally":[56],"lack":[57],"sufficient":[58],"security.":[60,174],"Experimental":[61,149],"neural":[62],"networkbased":[63],"achieves":[65],"high":[66],"processing":[67],"speed":[68],"introduces":[70],"overhead":[71],"due":[72,184],"to":[73,113,159,185],"model":[74],"training":[75],"limited":[78],"by":[79],"its":[80],"dependence":[81],"on":[82,140],"specific":[83],"datasets,":[84],"making":[85],"it":[86],"non-adaptive.In":[87],"this":[88],"work,":[89],"we":[90],"propose":[91],"novel":[93],"scheme":[96,155],"combining":[97],"chaotic":[98,111],"theory,":[99],"elliptic":[100,144,186],"curves,":[101],"static":[103,126],"S-boxes.":[104],"The":[105,175],"method":[106],"initially":[107],"employs":[108],"the":[109,122,153,180,191],"CCS":[110],"map":[112],"generate":[114],"master":[116],"key":[117,137,192],"sequence":[118],"used":[119,189],"for":[120],"encrypting":[121],"plain":[123],"image.":[124],"These":[125],"keys":[127],"further":[129],"utilized":[130],"symmetric":[133],"process":[134],"involving":[135],"secret":[136],"derivation":[138,193],"based":[139],"scalar":[141],"operations":[142,188],"over":[143],"curves":[145],"S-box":[147],"transformations.":[148],"analysis":[150],"demonstrates":[151],"that":[152],"proposed":[154],"offers":[156],"resistance":[158],"side-channel":[160],"statistical":[162],"attacks,":[163],"including":[164],"differential":[165],"analysis,":[166],"outperforming":[167],"several":[168],"existing":[169],"terms":[172],"of":[173],"main":[176],"limitation":[177],"lies":[178],"increased":[181],"cost":[183],"curve":[187],"process.":[194]},"counts_by_year":[],"updated_date":"2026-03-15T07:15:06.534987","created_date":"2026-03-14T00:00:00"}
